Sciweavers

4511 search results - page 4 / 903
» Observation Based System Security
Sort
View
SECURWARE
2008
IEEE
14 years 1 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
ACMSE
2004
ACM
14 years 25 days ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
IJNSEC
2007
123views more  IJNSEC 2007»
13 years 7 months ago
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
In this paper a secure error-signalling scheme for packetswitched network architectures is presented. Current solutions are based on the Internet Control Message Protocol to deliv...
Theodore Stergiou, Dimitrios L. Delivasilis
CHI
2008
ACM
14 years 7 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
FC
2010
Springer
226views Cryptology» more  FC 2010»
13 years 10 months ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena